Lecture Notes in Computer Science
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Lecture Notes in Computer Science 12704 Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, Beijing, China Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA
More information about this subseries at http://www.springer.com/series/7410
Kenneth G. Paterson (Ed.) Topics in Cryptology – CT-RSA 2021 Cryptographers’ Track at the RSA Conference 2021 Virtual Event, May 17–20, 2021 Proceedings 123
Editor Kenneth G. Paterson ETH Zürich Zürich, Switzerland ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-75538-6 ISBN 978-3-030-75539-3 (eBook) https://doi.org/10.1007/978-3-030-75539-3 LNCS Sublibrary: SL4 – Security and Cryptology © Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface The RSA conference has been a major international event for information security experts since its inception in 1991. It is an annual event that attracts several hundred vendors and over 40,000 participants from industry, government, and academia. Since 2001, the RSA conference has included the Cryptographer’s Track (CT-RSA). This track, essentially a sub-conference of the main event, provides a forum for the dis- semination of current research in cryptography. This volume represents the proceedings of the 2021 edition of the RSA Conference Cryptographer’s Track. Due to the COVID-19 pandemic, the conference was held online during May 17–20, 2021. The unusual circumstances provided an opportunity to revisit the format of the event and try to integrate it more fully into the main RSA conference. This was done by partnering each presentation session with a more informal, broader discussion session involving the presented papers’ authors and invited guests. I am grateful to the authors and guests for engaging with this experi- mental approach. A total of 100 submissions were received for review, of which 27 were selected for presentation and publication. The selection process was a difficult task since there were many more high quality submissions than we could accept. The submissions were anonymous, and each submission was assigned to at least three reviewers (four if the paper included a Program Committee member as an author or if it was a “Systemisation of Knowledge” paper). I am thankful to all Program Committee members for producing high-quality reviews and for actively participating in discussions. My appreciation also goes to all external reviewers. I am also grateful to the Program Committee members who acted as shepherds for some of the submissions. The submission and review process, as well as the editing of these proceedings, were greatly simplified by using the webreview software written by Dr. Shai Halevi, which we used with the permission of the International Association for Cryptologic Research (IACR). My thanks go to Shai. I am also grateful to Prof. Stanislaw Jarecki, my predecessor as Program Chair for CT-RSA. Stas provided a wealth of advice and insights based on his experience. I hope to be able to pass on to my successor as much as I obtained from Stas. My sincere thanks go also to Dr. Guido Zosimo-Landolfo from Springer Verlag and everyone on the team there for their assistance in preparing and producing these proceedings. Last, but not least, on behalf of all CT-RSA participants, I would like to thank Tara Jung and Britta Glade who acted as RSA Conference liaison to the Cryptographer’s Track. In this capacity, Tara and Britta essentially played the role of General Chairs for
vi Preface the CT-RSA conference, and I am very grateful to them for all the work they did in helping to organise the conference and making it run smoothly. March 2021 Kenneth G. Paterson
Organization Program Chair Kenneth G. Paterson ETH Zürich, Switzerland Program Committee Masayuki Abe NTT Secure Platform Labs, Japan Shi Bai Florida Atlantic University, USA Paulo Barreto University of Washington, USA Lejla Batina Radboud University, The Netherlands Elif Bilge Kavun University of Passau, Germany Olivier Blazy Université de Limoges, XLim, France Chris Brzuska Aalto University, Finland Céline Chevalier CRED, Université Paris II Panthéon-Assas, France Craig Costello Microsoft Research, USA Jean Paul Degabriele TU Darmstadt, Germany Luca De Feo IBM Research – Zürich, Switzerland Ben Fuller University of Connecticut, USA Steven Galbraith University of Auckland, New Zealand Lydia Garms Royal Holloway, University of London, UK Daniel Genkin University of Michigan, USA Paul Grubbs NYU, Cornell Tech, University of Michigan, USA Goichiro Hanaoka AIST, Japan Helena Handschuh Rambus Cryptography Research, USA Carmit Hazay Bar-Ilan University, Israel Andreas Hülsing Eindhoven University of Technology, The Netherlands Takanori Isobe University of Hyogo, Japan Marcel Keller CSIRO’s Data61, Australia Tancrède Lepoint Google, USA Benoit Libert CNRS and ENS de Lyon, France Brice Minaud Inria and ENS, France Tarik Moataz Aroki Systems, USA Svetla Nikova KU Leuven, Belgium Jiaxin Pan NTNU Norway, Norway Charalampos Papamanthou University of Maryland, USA Bertram Poettering IBM Research – Zürich, Switzerland Bart Preneel KU Leuven, Belgium Eyal Ronen Tel Aviv University, Israel Andy Rupp University of Luxembourg, Luxembourg Alexander Russell University of Connecticut, USA Jacob Schuldt AIST, Japan
viii Organization Nigel Smart KU Leuven, Belgium Juraj Somorovsky Paderborn University, Germany Martijn Stam Simula UiB, Norway Douglas Stebila University of Waterloo, Canada Fernando Virdia Royal Holloway, University of London, UK Michael Walter IST Austria, Austria Yuval Yarom University of Adelaide and Data61, Australia Additional Reviewers Miguel Ambrona Gunnar Hartung Thomas Peters Benedikt Auerbach Shoichi Hirose Chen Qian Gustavo Banegas Le Phi Hung Yuan Quan Laasya Bangalore Ilia Iliashenko Markus Raiber Subhadeep Banik Akiko Inoue Adrian Ranea Tim Beyne Samuel Jaques Simon Rastikian Rishabh Bhadauria Saqib A. Kakvi Krijn Reijnders Nina Bindel Vukasin Karadzic Vincent Rijmen Estuardo Alpirez Bock Shuichi Katsumata Yusuke Sakai Ryann Rose Carter Michael Klooss John Schanck Shan Chen Lilia Kraleva Berry Schoenmakers Ilaria Chillotti Kaoru Kurosawa Madura Shelton Ana Costache Gregor Leander Tjerand Silde Anamaria Costache Chaoyun Li Yongsoo Song Thomas Debris-Alazard Fukang Liu Jessica Sorrell Ioannis Demertzis Patrick Longa Christoph Striecks Amit Deo Vadim Lyubashevsky Younes Talibi Siemen Dhooghe Akash Madhusudan Ida Tucker Samuel Dobson Takahiro Matsuda Qingju Wang Keita Emura Alireza Mehrdad Yunhua Wen Eiichiro Fujisaki Nadia El Mrabet Keita Xagawa Alonso Gonzalez Kazuma Ohara Jianhua Yan Jérôme Govinden Satsuya Ohata Avishay Yanai Felix Günther Miyako Ohkubo Greg Zaverucha Fabrice Ben Hamouda Elisabeth Oswald Lukas Zobernig Keisuke Hara Guillermo Pascual Perez Marcus Brinkmann
Contents Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Daniele Cozzo, Nigel P. Smart, and Younes Talibi Alaoui Compilation of Function Representations for Secure Computing Paradigms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Karim Baghery, Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Nigel P. Smart, and Titouan Tanguy Oblivious TLS via Multi-party Computation . . . . . . . . . . . . . . . . . . . . . . . . 51 Damiano Abram, Ivan Damgård, Peter Scholl, and Sven Trieflinger Noisy Simon Period Finding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Alexander May, Lars Schlieper, and Jonathan Schwinger A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption . . . . . . . . . . . . . . . . . . 100 Marloes Venema and Greg Alpár Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Chao Niu, Muzhou Li, Siwei Sun, and Meiqin Wang SoK: Game-Based Security Models for Group Key Exchange. . . . . . . . . . . . 148 Bertram Poettering, Paul Rösler, Jörg Schwenk, and Douglas Stebila EPID with Malicious Revocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Olivier Sanders and Jacques Traoré Signed Diffie-Hellman Key Exchange with Tight Security . . . . . . . . . . . . . . 201 Jiaxin Pan, Chen Qian, and Magnus Ringerud Lattice-Based Proof of Shuffle and Applications to Electronic Voting . . . . . . 227 Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, and Thor Tunge More Efficient Shuffle Argument from Unique Factorization . . . . . . . . . . . . 252 Toomas Krips and Helger Lipmaa Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups . . . 276 Alex Biryukov, Aleksei Udovenko, and Giuseppe Vitto
x Contents FAN: A Lightweight Authenticated Cryptographic Algorithm . . . . . . . . . . . . 299 Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, and Shaoyu Du Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Yuqing Zhao, Wenqi Yu, and Chun Guo The Key-Dependent Message Security of Key-Alternating Feistel Ciphers . . . 351 Pooya Farshim, Louiza Khati, Yannick Seurin, and Damien Vergnaud Mesh Messaging in Large-Scale Protests: Breaking Bridgefy . . . . . . . . . . . . 375 Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková Inverse-Sybil Attacks in Automated Contact Tracing . . . . . . . . . . . . . . . . . . 399 Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, and Michelle Yeo On the Effectiveness of Time Travel to Inject COVID-19 Alerts . . . . . . . . . . 422 Vincenzo Iovino, Serge Vaudenay, and Martin Vuagnoux SoK: How (not) to Design and Implement Post-quantum Cryptography . . . . . 444 James Howe, Thomas Prest, and Daniel Apon Dual Lattice Attacks for Closest Vector Problems (with Preprocessing) . . . . . 478 Thijs Laarhoven and Michael Walter On the Hardness of Module-LWE with Binary Secret . . . . . . . . . . . . . . . . . 503 Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, and Weiqiang Wen Multi-party Revocation in Sovrin: Performance through Distributed Trust . . . 527 Lukas Helminger, Daniel Kales, Sebastian Ramacher, and Roman Walch Balancing Privacy and Accountability in Blockchain Identity Management. . . 552 Ivan Damgård, Chaya Ganesh, Hamidreza Khoshakhlagh, Claudio Orlandi, and Luisa Siniscalchi Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 Konstantinos Chalkias, François Garillot, Yashvanth Kondi, and Valeria Nikolaenko A Framework to Optimize Implementations of Matrices. . . . . . . . . . . . . . . . 609 Da Lin, Zejun Xiang, Xiangyong Zeng, and Shasha Zhang
Contents xi Improvements to RSA Key Generation and CRT on Embedded Devices . . . . 633 Mike Hamburg, Mike Tunstall, and Qinglai Xiao On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study . . . . . . . . . . 657 Anupam Chattopadhyay, Mustafa Khairallah, Gaëtan Leurent, Zakaria Najm, Thomas Peyrin, and Vesselin Velichkov Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
You can also read